From the course: Penetration Testing with Metasploit

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Video-based attacks

Video-based attacks

- [Instructor] For our first client site attack, we are going to use a mode, which is very near and dear our own lives, watching movies and videos on our laptops. There is an exploit module available in Metasploit, which essentially creates a backdoor and wraps it around a malicious video file. This video file works in two stages. If you recall our discussion about single and stagers in terms of the exploitation modules, how it works is it exploits a specific version of VLC Media Player and creates a backdoor for us. So let's see how it works. As you can see, it works on VLC version 2.2.8 for x86 and x64 version of Windows 10. It creates two files, MKV one and MKV two. And basically, creates a backdoor for us. However, if you read the description carefully, this module has been tested with payloads, such as Windows/exec, Windows/x64/exec, reverse_tcp, and reverse_tcp/shell. Meterpreter payloads can cause the application to…

Contents